Sciweavers

330 search results - page 66 / 66
» Controlling data disclosure in computational PIR protocols
Sort
View
SENSYS
2003
ACM
13 years 10 months ago
CODA: congestion detection and avoidance in sensor networks
Event-driven sensor networks operate under an idle or light load and then suddenly become active in response to a detected or monitored event. The transport of event impulses is l...
Chieh-Yih Wan, Shane B. Eisenman, Andrew T. Campbe...
IPCAI
2010
13 years 9 months ago
Evaluation of a 4D Cone-Beam CT Reconstruction Approach Using an Anthropomorphic Phantom
Abstract. We have previously developed image-guided navigation systems for thoracic abdominal interventions utilizing a three dimensional (3D) Cone-Beam CT (CBCT) image acquired at...
Ziv Yaniv, Jan Boese, Marily Sarmiento, Kevin Clea...
AAMAS
2006
Springer
13 years 5 months ago
CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing filesystem inspections to verify the content of security-critical files in order ...
Adam J. Rocke, Ronald F. DeMara
ITIIS
2008
151views more  ITIIS 2008»
13 years 5 months ago
Bandwidth Management of WiMAX Systems and Performance Modeling
WiMAX has been introduced as a competitive alternative for metropolitan broadband wireless access technologies. It is connection oriented and it can provide very high data rates, ...
Yue Li, Jianhua He, Weixi Xing
JUCS
2006
117views more  JUCS 2006»
13 years 5 months ago
Resource Efficient Maintenance of Wireless Network Topologies
Abstract: Multiple hop routing in mobile ad hoc networks can minimize energy consumption and increase data throughput. Yet, the problem of radio interferences remain. However if th...
Tamás Lukovszki, Christian Schindelhauer, K...